Skip to content

Commit 29f023b

Browse files
committed
chore: manifests
1 parent 8195ba3 commit 29f023b

2 files changed

Lines changed: 20 additions & 0 deletions

File tree

deploy/charts/operator-crds/templates/toolhive.stacklok.dev_mcpexternalauthconfigs.yaml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,16 @@ spec:
217217
Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash.
218218
pattern: ^https?://[^\s?#]+[^/\s?#]$
219219
type: string
220+
disableUpstreamTokenInjection:
221+
default: false
222+
description: |-
223+
DisableUpstreamTokenInjection prevents the embedded auth server from injecting
224+
upstream IdP tokens into requests forwarded to the backend MCP server.
225+
When true, the embedded auth server still handles OAuth flows for clients
226+
but does not swap ToolHive JWTs for upstream tokens on outgoing requests.
227+
This is useful when the backend MCP server does not require authentication
228+
(e.g., public documentation servers) but you still want client authentication.
229+
type: boolean
220230
hmacSecretRefs:
221231
description: |-
222232
HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing

deploy/charts/operator-crds/templates/toolhive.stacklok.dev_virtualmcpservers.yaml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2736,6 +2736,16 @@ spec:
27362736
Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash.
27372737
pattern: ^https?://[^\s?#]+[^/\s?#]$
27382738
type: string
2739+
disableUpstreamTokenInjection:
2740+
default: false
2741+
description: |-
2742+
DisableUpstreamTokenInjection prevents the embedded auth server from injecting
2743+
upstream IdP tokens into requests forwarded to the backend MCP server.
2744+
When true, the embedded auth server still handles OAuth flows for clients
2745+
but does not swap ToolHive JWTs for upstream tokens on outgoing requests.
2746+
This is useful when the backend MCP server does not require authentication
2747+
(e.g., public documentation servers) but you still want client authentication.
2748+
type: boolean
27392749
hmacSecretRefs:
27402750
description: |-
27412751
HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing

0 commit comments

Comments
 (0)